SSL Lifecycle Automation

CertFlow

SSL certificate automation for multi-domain, multi-cloud teams

CertFlow helps developers and small teams issue, deploy, monitor, and renew SSL certificates with DNS provider credentials or delegated DNS validation, reducing outages caused by expired certificates and manual rollout.

One workflow for validation, deployment, and renewal
Auto-renews before expiry, no manual intervention needed
Deploy across platforms in one go, no more configuring one by one

Unified Workflow

Validation, issuance, deployment, and renewal — one unified workflow

CertFlow replaces provider console hopping and one-off scripts with a single certificate workflow your team can actually operate.

Workflow Active
DNS validation ready*.prod.example.com

Write TXT records through a DNS Provider, or validate through CNAME delegation.

View
Certificate issuedapi.certflow.io

ACME verification passed. Certificate ready in 2m 30s.

View
Deployed to 3 targetscdn.edge.example.cn

Certificate pushed to CDN, load balancer, and server automatically.

View

8+

DNS & cloud providers

9+

Deployment target types

24/7

Automated monitoring & renewal

Why Teams Switch

CertFlow manages certificate issuance, deployment, and renewal in one place

Use one workflow for DNS validation, issuance, deployment, renewal, and free certificate monitoring.

Two DNS-01 validation modes

Write TXT records through a saved DNS Provider, or add one CNAME and use delegated DNS validation.

One-click deployment to any target

Push certificates to servers, load balancers, CDNs, and cloud services without custom deployment scripts.

Encrypted credential storage

DNS, cloud, and SSH credentials are stored with AES-256-GCM encryption. APIs return masked metadata by default.

Expiry alerts & auto-renewal

See upcoming renewals, catch failures early, and let CertFlow renew and redeploy automatically.

Supported Providers & Deployment Targets

DNS validation covers major DNS providers; deployment covers SSH servers, load balancers, CDNs, and cloud products. The free plan includes certificate monitoring quota, and monitoring does not require DNS, SSH, or cloud credentials first.

DNS Providers

Alibaba Cloud DNSTencent Cloud DNSPodCloudflareAWS Route 53Google Cloud DNSHuawei Cloud DNSVolcengine TrafficRouteGoDaddy

Cloud Platforms

Alibaba CloudTencent CloudAWSGoogle CloudHuawei CloudVolcengine

Deployment Targets

SSH ServerAlibaba Cloud CDNAlibaba Cloud ALB/CLB/NLBTencent Cloud CDNTencent Cloud CLBHuawei Cloud CDNHuawei Cloud ELBVolcengine CDN/DCDNVolcengine CLB/ALB

Security Boundaries

How credentials, DNS delegation, and private keys are used

CertFlow uses only the information needed for certificate issuance, deployment, renewal, and notifications. Sensitive content is encrypted at rest and not returned in API responses by default.

What delegated DNS validation means

Delegation mode does not store your DNS Provider secret. You point the `_acme-challenge` CNAME at CertFlow so it can complete ACME DNS-01 for that validation name.

Use least-privilege credentials

If you save AccessKeys or SSH credentials, use a dedicated sub-account and grant only the required DNS zone or deployment target permissions.

How certificate private keys are used

Managed certificates require storing certificate PEM and private key PEM. They are encrypted and used only for downloads, renewal deployment, and writes to your configured targets.

Failure states stay visible

Renewal and deployment status is shown in the dashboard. When a failure needs your action, CertFlow sends failure notifications through subscribed channels.

Certificate Monitoring

Your infrastructure has certificates CertFlow didn't issue — monitor those too

Add any public HTTPS endpoint and CertFlow watches it around the clock, without requiring DNS, SSH, or cloud credentials first. Get tiered alerts at the thresholds you set, so you have enough time to act before certificates expire.

Live Monitoring
60d30d15d7d3d1d
api.example.com
Healthy
245d
shop.example.cn
Expiring
14d
cdn.partner.io
Expired
0d
mail.internal.co
Healthy
120d

Monitor any HTTPS endpoint

Not just CertFlow-managed certificates — add any public URL your team depends on and track its certificate status.

Multi-threshold alerting

Configure alerts at 60, 30, 15, 7, 3, and 1 day before expiry. Each threshold fires independently — you choose how early to know.

TLS health diagnostics

Beyond expiry — detect DNS resolution failures, TCP timeouts, and TLS handshake errors before your users do.

How It Works

Three steps to reliable certificate automation

Connect your infrastructure once, add domains, and give your team one predictable certificate workflow.

01

Connect your providers

Add DNS providers, cloud accounts, and SSH servers. If you do not want to store a DNS Provider secret, use delegated DNS validation instead.

Credentials and certificate material are encrypted and only used for certificate issuance, deployment, or notification operations.

02

Add domains and automate deployment

Choose the validation provider and deployment targets once. CertFlow handles ACME validation, issuance, and certificate rollout automatically.

Once configured, every certificate follows the same reliable process — no manual steps, no surprises.

03

Keep renewals visible and predictable

Track expiry timelines, deployment health, and failures from one dashboard so renewals stop depending on memory and manual scripts.

No more scripts going stale, no silent failures — every certificate's status is visible and traceable.

FAQ

SSL certificate automation FAQ

Understand how CertFlow differs from certbot, how DNS-01 validation works, how credentials are stored, and what the free plan includes.

How is CertFlow different from certbot?

certbot is a strong fit for issuing and renewing certificates on one server with a small number of sites. If you only maintain one site on one server, certbot may already be enough. CertFlow is built for multi-domain, multi-server, and multi-cloud setups, with DNS-01 validation, issuance, deployment, renewal, monitoring, and alerts managed from one dashboard.

Why do wildcard certificates need DNS-01 validation?

Wildcard certificates need proof that you control the whole domain zone, such as *.example.com. In ACME workflows, wildcard certificates usually require a _acme-challenge TXT record in DNS. CertFlow can write that TXT record through a DNS provider API, or use delegated DNS validation to reduce manual work.

Do I need to provide DNS provider AccessKeys?

Not always. CertFlow can save DNS provider credentials and write validation records automatically, or use delegated DNS validation. With delegation, you add one CNAME in your own DNS and CertFlow handles future validation. If you save an AccessKey, use a dedicated sub-account and grant only the required DNS zone permissions.

How are credentials stored?

DNS, cloud, and SSH credentials are stored with AES-256-GCM encryption. APIs return masked metadata by default and do not return decrypted credential values. Credentials are used only for the certificate issuance, deployment, renewal, and notification operations you configure.

What happens when certificate renewal fails?

When renewal or deployment fails, CertFlow shows the status in the dashboard. If the failure needs user action, CertFlow sends a failure notification through the channels you configured. Failures are not hidden as healthy states, so you can see whether the issue came from DNS validation, issuance, deployment targets, or an external service.

Which DNS providers and cloud products are supported?

Current DNS providers include Alibaba Cloud DNS, Tencent Cloud DNSPod, Cloudflare, AWS Route 53, Google Cloud DNS, Huawei Cloud DNS, Volcengine TrafficRoute, and GoDaddy. Cloud platforms and deployment targets cover Alibaba Cloud, Tencent Cloud, AWS, Google Cloud, Huawei Cloud, Volcengine, plus SSH servers, CDNs, and load balancers.

What can I do on the free plan?

The free plan includes quotas for 3 domains, 5 deployment targets, and 5 certificate monitors. After signing up, you can add domains and configure certificate automation, or start by adding public HTTPS endpoints for expiry monitoring.

Is CertFlow suitable for personal site owners?

Yes, when you manage multiple domains, multiple sites, or multiple deployment targets. For example, one certificate may need to reach a server, CDN, and load balancer, or you may want centralized expiry monitoring. If you run one simple site and certbot is already stable on your server, staying with that setup is also reasonable.

Get Started

Stop firefighting certificate renewals.

Free plan includes quotas for 3 domains, 5 deployment targets, and 5 monitors. Start configuring after signup. No credit card required.